Categories
Writers Solution

Correct administrative configuration and secure device access

Task-1: Network Configuration
Marking guide lines:
• Design an efficient IP addressing plan: 4 marks
o Note that you need to spare IP addresses for the management LAN.
o Use this guideline to help you with this task: https://www.cisco.com/c/dam/en/us/solutions/collateral/enterprise/design-zone-smart-business-architecture/sba_ipAddr_dg.pdf
• Correct administrative configuration and secure device access: 4 marks
o Configure device name, access banner, domain-lookup
o Configure and secure all device access passwords
o Disable all unused ports
• Configure all required device interfaces with appropriate IP addresses and meaningful descriptions and assign IP addresses to all PCs in the network: 2 marks
• Configure IP routing and verify the network connectivity and fix any issues: 4 mark
o Configure OSPF routing for the network
o Verify the network connectivity with ping.
• Backup all device configuration to a TFTP server in the head quarter: 1 mark
o Configure a TFTP server in the HQ
o Issues commands to backup all device config to the TFTP server.
Task-2: Network Management
Marking guide lines:
• Design the high-level physical layout for the lab to show the cabling structure and equipment rack and export it to a JPEG or PDF file. (4 marks)
• Modify the current network to add the management network (6 marks)
o Create the management interface for the switches (VLAN99) and assign IP addresses to all routers and management interfaces (2 marks)
o Allocate a dedicate physical management port on each switch an assign the management port to VLAN99 (1 mark).
o Connect the management port to a physical interface of the local router (1 mark).
o Configure the router interface and modify the network routing to allow to connect to the management network (2 marks).
• Configure SNMPv2 on each network devices and deploy a network management station at the head quarter to manage the whole network. (3 marks)
o Create a network management station in the head quarter to manager the network. Assign IP address to the station (1 mark).
o Configure a MIB browser on the management station to access the device management information (2 marks).
• Record YouTube video to demonstrate that you can manage the devices (2 marks)

GET SOLUTION FOR THIS ASSIGNMENT, Get Impressive Scores in Your Class

CLICK HERE TO MAKE YOUR ORDER

TO BE RE-WRITTEN FROM THE SCRATCH

GET SOLUTION FOR THIS ASSIGNMENT

CLICK HERE TO MAKE YOUR ORDER

TO BE RE-WRITTEN FROM THE SCRATCH

NO PLAGIARISM

  • Original and non-plagiarized custom papers- Our writers develop their writing from scratch unless you request them to rewrite, edit or proofread your paper.
  • Timely Deliveryprimewritersbay.com believes in beating the deadlines that our customers have imposed because we understand how important it is.
  • Customer satisfaction- Customer satisfaction. We have an outstanding customer care team that is always ready and willing to listen to you, collect your instructions and make sure that your custom writing needs are satisfied
  • Confidential- It’s secure to place an order at primewritersbay.com We won’t reveal your private information to anyone else.
  • Writing services provided by experts- Looking for expert essay writers, thesis and dissertation writers, personal statement writers, or writers to provide any other kind of custom writing service?
  • Enjoy Please Note-You have come to the most reliable academic writing site that will sort all assignments that that you could be having. We write essays, research papers, term papers, research proposals. Correct administrative configuration and secure device access

Get Professionally Written Papers From The Writing Experts 

Green Order Now Button PNG Image | Transparent PNG Free Download on SeekPNG Our Zero Plagiarism Policy | New Essays
Categories
Writers Solution

Configuration of Internet Protocol

You are Sam Smith, a network technician with Global Packaging. You have been asked to configure the Internet Protocol (IP) address and subnet mask on a local host computer to enable IP connectivity. For this assignment, include the following:•Write a summary explaining why the IP address and subnet mask enable computers to communicate with each other on that network. •Briefly explain how you know that the host computer was placed on the correct subnet. •Discuss the relationship between IP addressing, DNS and DHCP. •Describe briefly the different types of network messages. •Provide relevant research to support your statements. •Submit your individual work in a Word document approximately 1-3 pages in length to the Small Group submission area. 

…………………………………………………………………………………………………

SEE SOLUTION BELOW

ASSIGNMENT COMPLETED AT https://capitalessaywriting.com

MAKE YOUR ORDER AND GET THE COMPLETED ORDER

NO PLAGIARISM

Configuration of Internet Protocol

(Course Instructor)

(University Affiliation)

(Student’s Name)

Configuration of Internet Protocol

            All personal computers, just like the houses that we live, need addresses when on the network or in the internet (Gupta, 2006). Although some operating system may automatically assign the computers the Internet Protocol (IP) address, sometimes we may be required to assign the IP address manually, if the system cannot. The configuration of the IP address requires a valid IP address and filling of the subnet task. The subnet task is responsible for the identification of the address that identifies the host PC and the part that identifies the network.

Why the IP Address and Subnet Mask Enable Computers to Communicate With Each Other On the Network           The success of the use of IP address as the internet network protocol draws largely from its ability to allow a connection of networks of different sizes and different systems (Gupta, 2006). The IP address for each computer is unique, which identifies, and separates the host on the network. The networks are often divided into three main classes of predetermined sizes, which the administrator can then subdivide into smaller sub networks. The process of subdividing network into smaller sections of networks is called subnetting. This process is very useful because it helps in the isolation of groups…………………………………………………………………………………………………………………………………………………………………………………………………………………………….

GET THE COMPLETED ASSIGNMENT

ASSIGNMENT COMPLETED AT CapitalEssayWriting.com

MAKE YOUR ORDER AND GET THE COMPLETED ORDER

CLICK HERE TO ORDER THIS PAPER AT CapitalEssayWriting.com

NO PLAGIARISM